• E-mail policies — A defense against phishing attacks

    In this excerpt of Chapter 6 from "Phishing: Cutting the Identity Theft Line," authors Rachael Lininger and Russell Dean Vines explain how e-mail policies help protect companies from phishing attacks.

    ITKE364,190 pointsBadges:
  • Podcast: Fact or fiction — The future of email attacks

    What will the future hold regarding email attacks? In this expert podcast, Tom Bowers will confirm or debunk a number of common beliefs about what's coming next.

    ITKE364,190 pointsBadges:
  • Microsoft Exchange Server security dos and don’ts

    Microsoft Exchange Server email security threats, such as spam and viruses, are a constant concern. What is the best method for protecting an Exchange Server organization against these email threats? Which antivirus and antispam products offer the most complete protection? Read these Exchange...

    ITKE364,190 pointsBadges:
  • How can enterprises prevent man-in-the-email attacks?

    A new global email scam has cost enterprises millions. Expert Nick Lewis explains how to defend against man-in-the-email attacks with proper training and little technology.

    searchsecurity22,825 pointsBadges:
  • How IT can compete with personal email account use

    When a business user resorts to forwarding email to a personal email account, it can endanger corporate information. IT may have to take some cues from Gmail to stop this practice.

    rhsheldon710 pointsBadges:
  • Business email security and the risks of personal Gmail forwarding

    Business email security might not be on employees’ minds when they forward corporate mail to more user-friendly Gmail accounts, so IT should take steps to protect corporate data.

    svanvugt965 pointsBadges:
  • Will cloud email services replace old-school enterprise email?

    IT pros may worry about the security of cloud email services, but flexibility, user-friendliness and reduced overhead might make the cloud an attractive alternative.

    Craig Mathias915 pointsBadges:
  • The changing threat of email attacks

    In this Messaging Security School lesson, expert Mike Rothman details the state of next-generation email threats, explores reputation systems and uncovers threats AV can't catch.

    ITKE364,190 pointsBadges:
  • How would your organization respond to an email extortion scheme?

    searchsecurity22,825 pointsBadges:
  • How should CSIRTs respond to email extortion schemes?

    The 2014 Sony Pictures hack highlights the importance of responding appropriately to email extortion. Learn what steps executives should take to best manage the situation.

    searchsecurity22,825 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.